b. Change the cryptographic keys when employees leave the organization.
c. Protect data prior to signature generation/verification or encryption/decryption.
d. Provide the capability for local users to view all data that is being signed or encrypted.
111. During the operation and maintenance phase of a system development life cycle (SDLC) as it relates to cryptography, which of the following requires configuration management most?
1. Hardware and firmware
2. System software maintenance and update
3. Application software maintenance
4. Cryptographic key maintenance
a. 1 and 2
b. 2 and 3
c. 3 and 4
d. 1, 2, 3, and 4
The application software maintenance scope covers updating passwords, deleting users from access lists, updating remote access, and changing roles and responsibilities of users and maintenance personnel, which are mostly routine in nature. The cryptographic key maintenance scope includes key archiving, key destruction, and key change, as it is mostly done in the disposal phase.
112. During the operational phase of cryptography, key recovery means which of the following?
1. Acquiring keying material from backup
2. Acquiring keying material by reconstruction
3. Binding keying material to information
4. Binding keying material to attributes
a. 1 and 2
b. 2 and 3
c. 3 and 4
d. 1, 2, 3, and 4
113. During the operational phase of cryptography, which of the following keying material does
a. Domain parameters
b. Passwords
c. Audit information
d. Random number generator seed
Domain parameters are incorrect because they can be backed up. It is a parameter used with some public key algorithm to generate key pairs, to create digital signatures, or to establish keying material. Passwords are incorrect because they can be backed up. A password is a string of characters (for example, letters, numbers, and other symbols) that are used to authenticate an identity or to verify access authorization. Audit information is incorrect because it can be backed up and can be used to trace events and actions.
114. During the post-operational phase of cryptography, which of the following keying material does
a. Initialization vector
b. Audit information
c. Passwords
d. Domain parameters